共 22 条
- [1] Goldreich O, Ostrovsky R., Software protection and simulation on oblivious RAMs, Journal of the ACM, 43, 3, pp. 431-473, (1996)
- [2] Boneh D, Crescenzo G D, Ostrovsky R, Et al., Public key encryption with keyword search, Proc of Int Conf on the Theory and Applications of Cryptographic Techniques, pp. 506-522, (2004)
- [3] Song Xiaodong, Wagner D, Perrig A., Practical techniques for searches on encrypted data, Proc of IEEE Symp on Security & Privacy, pp. 44-55, (2000)
- [4] Park H A, Byun J W, Lee D H., Secure index search for groups, Proc of the 2nd Int Conf on Trust, Privacy & Security in Digital Business, pp. 128-140, (2005)
- [5] Chang Yancheng, Mitzenmacher M., Privacy preserving keyword searches on remote encrypted data, Proc of Applied Cryptography and Network Security, pp. 442-455, (2005)
- [6] Yang Lei, Zheng Qingji, Fan Xinxin, RSPP: A reliable, searchable and privacy-preserving e-healthcare system for cloud-assisted body area networks, Proc of IEEE INFOCOM 2017-IEEE Conf on Computer Communications, pp. 1-9, (2017)
- [7] Hu Wen, Shafagh H, Hithnawi A., Talos: Encrypted query processing for the internet of things, Proc of ACM Conf on Embedded Networked Sensor Systems, pp. 197-210, (2015)
- [8] Li Huige, Tian Hua, Zhang Feng, Et al., Blockchain-based searchable symmetric encryption scheme, Computers & Electrical Engineering, 73, 1, pp. 32-45, (2019)
- [9] Kim M, Lauter K., Private genome analysis through homomorphic encryption, BMC Medical Informatics & Decision Making, 15, 5, pp. 1-12, (2015)
- [10] Fagin R., Combining fuzzy information from multiple systems, Journal of Computer & System Sciences, 58, 1, pp. 777-780, (1996)